AS-CRED: Reputation Service for Trustworthy Inter-domain Routing

Size: px
Start display at page:

Download "AS-CRED: Reputation Service for Trustworthy Inter-domain Routing"

Transcription

1 AS-CRED: Reputation Service for Trustworthy Inter-domain Routing Krishna Venkatasubramanian Computer and Information Science University of Pennsylvania ONR MURI N Review Meeting June 10, 2010

2 Overview Border Gateway Protocol Problems with BGP AS-CRED Behavior Analysis Reputation Computation Alert Generation Performance Analysis Conclusion and Future Work 11/4/09 ONR MURI Review 2

3 Border Gateway Protocol AS X p = /8 R1 R2 Autonomous Systems Address prefix owned by ASX p ASX p ASX AS Y R3 BGP Update (Announcement) p ASX, ASY p ASX, ASY R4 BGP Update (Withdrawal) AS Z 11/4/09 ONR MURI Review 3

4 Problems: Inaccurate BGP Updates Announcement of IP prefixes not owned by ASX or are bogons AS X R1 R4 AS Z Persistent and well-known problem p ASX p= /8 R2 AS Y R3 p ASX, ASY Reasons for occurrence: Blocking Content YouTube was unavailable for about 1 hour when its Prefix was hijacked by Pakistan Telecom AS Spamming AS 8717, an ISP in Sofia, Bulgaria, originated announcements for /8 May due to malicious intent or misconfiguration Inaccurate Updates Well-known Incidences Prefix hijacked Victim AS Attacker AS Dates / April 8, / March 15, / (YouTube) Feb. 24, / (ebay) November 30, / Jan. 13, /8 NULL 8717 Dec Jan / Dec Jan /4/09 ONR MURI Review 4

5 Problems: Unnecessary BGP Updates Repeated announcement and withdrawal of IP prefixes owned by ASX, or illegal AS values in update message p AS X R1 R2 R3 R4 AS Z Persistent and NOT well-known problem Order of magnitude larger problem compared with prefix hijacking p ASX AS Y p ASX, ASY Principal suspected reason Misconfiguration of BGP router Unnecessary Updates Example: Prefix /24 announced and withdrawn 4824 times by AS37035 between Dec. 3, 2009 and Dec. 7, 2009, once every 1.5 minutes. Announcement of private AS numbers (e.g., AS65535) due to improper export policy filtering Prominent Incidences AS Prefix Dates RAW /24 Dec.3 Dec /24 Nov. 2 - Nov. 10, /30 Dec. 8 - Dec. 31, /24 Nov. 1 - Nov. 27, /4/09 ONR MURI Review 5

6 Feedback Approach Principal Question: How do we know if ASes are announcing valid updates? Update Validity: necessary and accurate Feedback Interaction Approach: Essentially a question of trust a subjective expectation on the behavior of an entity In this problem: Entity Autonomous Systems Behavior announcement of valid BGP updates Observation: ASes repeat their behaviors Past can be used to predict future Metric of choice: Reputation Phase I Evaluation of interaction Phase II f Reputation Function 11/4/09 ONR MURI Review 6

7 Goals Compute the reputation for Autonomous Systems in the Internet, by analyzing past BGP updates announced by them for their validity accuracy and necessity. Provide an alert service for tracking the subsequent announcement of potentially invalid BGP updates based on the computed reputation. Deploy as an publically available service for everyone to use. 11/4/09 ONR MURI Review 7

8 Traditional Approach BGP Update Invalidity Detection Prefix Hijacking Bogons Private AS Numbers Frequent Announcements and Withdrawals Control-plane Information Data-plane Probing Reputation Static Checking Karlin et. al 09 Qiu et. al 07 Lad et.al 04 Mahajan et. al 02 Xao et. al 02 X. Hu et. al 07 Zheng et. al 07 Zhang et. al 05 N. Hu et. al 07 Yu et. al 05 Implemented as a part of BGP route policy space Use Short-lived prefix announcements as basis for detection Consider them both malicious and misconfigured Provide alerts for potential hijacks Third-Party Feedback Dependent Requires Overlay Trust Network 11/4/09 ONR MURI Review 8

9 Traditional Approach BGP Update Invalidity Detection Control-plane Information Karlin et. al 09 Qiu et. al 07 Lad et.al 04 Mahajan et. al 02 Xao et. al 02 Prefix Hijacking X. Hu et. al 07 Zheng et. al 07 Zhang et. al 05 N. Hu et. al 07 Yu et. al 05 Bogons Private AS Numbers Principal Issues: Data-plane Probing No Non-necessity Reputation check Static Checking No quantitative modeling of AS behavior tendencies High False Positives Implemented as a part of BGP route policy space Frequent Announcements and Withdrawals Use Short-lived prefix announcements as basis for detection Consider them both malicious and misconfigured Provide alerts for potential hijacks Third-Party Feedback Dependent Requires Overlay Trust Network 11/4/09 ONR MURI Review 9

10 AS-CRED: Architecture BGP Activity Manager: Database for BGP updates Obtained from well-connected BGP data collectors AS-Behavior Analyzer: Analyzes the updates in BGP Activity Manager, based on a set of well-defined properties to detect invalidity The results of the analysis, is a feedback on the past behavior of ASes Reputation Manager: Computes the reputation of the ASes based on a well defined mathematical function Uses past behavior information in the form of feedback Reputation Portal: Once the AS reputations are computed it is made available through a web portal Alert Manager: Uses AS reputation, to trigger real-time alerts regarding potential invalidity of any new updates propagated within the Internet. AS-CRED Architecture 11/4/09 ONR MURI Review 10

11 Data Source: RouteViews Basically a group of BGP routers (AS 6447) peered with about 40 other ASes at crucial places Receives updates from the peers which it stores in its database without any filtering Maintains RIB dumping database: a prefix list with time-stamped information on origin and AS-path ASX 6447 ASY Route-Views does not originate any prefix or forward a received update message RIB dumping every two hours, update messages every 15 minutes Useful for analyzing past behaviors of ASes ASZ For every prefix visible to ASes X, Y and Z an entry exists in /4/09 ONR MURI Review 11

12 Behavior Analysis: Property I Observation: AS prefix bindings which are invalid usually last for a short period of time, i.e., they are unstable. M Length of Learning Window Aim: Detect AS-prefix bindings stability Need: Historical Information based analysis Analysis window (60 days learning window) Two complimentary metrics Prevalence percentage of learning window AS-prefix binding lasted Persistence average time an AS-prefix binding lasted M Time prefix (p) withdrawn by AS (M) Index of each announcement and withdrawal AS-prefix binding timeline Time prefix (p) announced by AS (M) 25% 15 % 25% Learning window = 60 days Total number of announcements and withdrawals Pr = 65%; Ps = ( )*60/3 = 13 days 11/4/09 ONR MURI Review 12

13 Property II & Feedback Initial Classification Prevalence Persistence Feedback Entry format AS prefix Timestamp of announcement Hi Hi Good Hi Lo Bad (Unnecessary) Ugly Lo Hi Good Lo Lo Ugly (Inaccurate) Feedback Type Bad Good Refinement Past Ownership and AS_PATH AS X Ownership of Prefix P AS X ownership of Prefix P Good Ugly P P Refinement 1 Bad AS X AS X AS U AS W AS W prefix P AS Y prefix P Refinement 2 Good Bad Ugly Current Ownership and AS_PATH 11/4/09 ONR MURI Review 13

14 Stability Threshold Feedback results in three sets: Good, Bad and Ugly Threshold needed to determine: What is Hi and Lo? Generated based on comparison with Internet Route Registries (IRR), the closest source to ground truth available Compare False Positive: entries in IRR found in Ugly set False Negative: entries not in IRR found in Good and Bad set Choosing Thresholds Value of choice: T Pr = 1% and T Ps = 10 hours 11/4/09 ONR MURI Review 14

15 Behavior Analysis: Property II Observation: BGP updates contain illegal values for ASes and the prefixes they announce Legal AS numbers Illegal AS numbers Illegal AS numbers: Example, those in the range of: , r X Y Z Bogons: Set of yet to be allocated prefixes receiver blamed announcer Feedback: Illegal AS numbers: First AS in the AS-PATH with a legitimate value blamed Update considered Unnecessary Bogons: The announcer is blamed Update considered Inaccurate r receiver Illegal AS Number X Y Bogon Announcement blamed Z Bogon announcer 11/4/09 ONR MURI Review 15

16 Reputation Computation AS-CRED computes untrustworthiness of ASes in announcing valid updates Reputation of an AS is computed based on Bad and Ugly feedback only Time-decay function Uses a time-decay function where X is either B or U h X is a half-life of behavior X t now is the current time t i is the feedback timestamp: Two reputation values created for each AS RepU characterizes an As s past inaccurate update announcement RepB - characterizes an As s past unnecessary update announcement t now Half-life: time by which the weight of the reputation of an AS is halved Set based on by when 75% of the ASes repeat their invalid updates Values: h U = 3 days, h B = 6 days t i 11/4/09 ONR MURI Review 16

17 Alert Generation Process Three Steps Process White-List Filtering: When a new update is received, we first checks to see if its corresponding AS-prefix binding (a, p) is in our white-list (G set) Initial State RepU of all ASes Good (White-List) Ugly Bad RepB of all ASes Alert Generation: If (a, p) are not in the white-list, we post an potential invalid Alert 2 Fetch Update 1 Search Good (White-List) Found Relabeling: Label updated to Unnecessary, if RepB(a) is poor or RepU(a) is poor with p p such that (a, p ) is in the white-list. Label updated to Inaccurate, if RepU(a) is poor with no p p such that (a, p ) is in the white-list T U RepU Alert: Inaccurate T B NOT Found Alert: Potential Invalid RepB + Refinement 1 Alert: Unnecessary Alert Generation 11/4/09 ONR MURI Review 17

18 Behavior Analysis (Nov 1, 09- Dec 30, 09) Property I: Unnecessary repeated updates far outnumber prefix hijackings or updates with illegal AS numbers Updates for prefix hijacking and illegal AS numbers instances are similar in scale Entries in the U set are exclusively prefix hijacking instances Property II: updates affected by illegal AS numbers leading to penalization of 134 ASes Zero instances of Bogons Repetitive poor behavior displayed, makes reputation a good metric for trust establishment Shows Number of entries in B and U set after the learning window. 11/4/09 ONR MURI Review 18

19 Behavior Analysis (Nov 1, 09- Dec 30, 09) Property I: Unnecessary repeated updates far outnumber prefix hijackings or updates with illegal AS numbers Updates for prefix hijacking and illegal AS numbers instances are similar in scale Entries in the U set are exclusively prefix hijacking instances Property II: updates affected by illegal AS numbers leading to penalization of 134 ASes Zero instances of Bogons Observation: Unnecessary updates a bigger problem in inter-domain routing compared to updates with Inaccurate information Repetitive poor behavior displayed, makes reputation a good metric for trust establishment Shows Number of entries in B and U set after the learning window. 11/4/09 ONR MURI Review 19

20 Quality of Behavior Analysis Inaccurate Updates U set stores instances of inaccurate updates prefix hijacking Inaccurate updates detected compared with Internet Alert Registry w.r.t. IRR 4 fold improvement in False Positives Unnecessary Updates B set stores instances of Unnecessary updates Unnecessary updates from repeated announcements and withdrawals were 92% legitimate AS-prefix bindings (based on Internet Route Registry) Announced 42 times more often than Good AS-prefix bindings False Positive Scheme No Record IRR Match No IRR Match AS-CRED 841 (13.7%) 975 (18.4%) 4323 (81.6%) IAR 4190 (10.7%) (74.4%) 8903 (25.6%) # Announcements and Withdrawals Hijack Behavior Analysis (Nov 1- Dec 30) Vs. IAR w.r.t. IRR AS Prefix NAW Duration Observed / Nov 2-10, / Dec 8 31, / Nov 1-27, 2009 Prominent Examples of Unnecessary Updates 11/4/09 ONR MURI Review 20

21 Behavior Analysis Overall Statistics Prefix Statistics Property Value Prefixes Observed SOAS Prefix Observed MOAS Prefix Observed 9750 AS Statistics Property Value AS Observed AS announcing Unnecessary Updates 1568 (4.6%) AS announcing Inaccurate Updates 693 (2.0%) AS exclusively announcing Unnecessary Updates 79 AS exclusively announcing Inaccurate Updates 89 AS-Prefix Binding Classification Property Value Behavior Incidences Statistics Total AS-Prefix Bindings AS-Prefix Bindings in Inaccurate Updates 6139 AS-Prefix Bindings in Unnecessary Updates Property Value Number of Inaccurate Updates Number of Unnecessary Updates /4/09 ONR MURI Review 21

22 Reputation Analysis AS-CRED Reputation characterizes the current perpetrators of invalid updates announcement: ZERO reputation is considered good behavior 693 ASes have RepU > ASes have RepB > 0 90% of ASes with poor behavior have reputation close to ZERO ASes show repetitive behaviors Most ASes are good, very few ASes demonstrate repeated poor behaviors AS-CRED is sensitive in detecting even announcers of one-off invalid updates Reputation of ASes on Jan 1, 2010 Bottom 5 Ases by Reputation on Jan 1, /4/09 ONR MURI Review 22

23 Alert Consistency Given AS reputation, newly received updates received over Jan 1, 2010 Jan 10, 2010 are be evaluated Updates not seen in white-list classified as unnecessary or inaccurate based on reputation of announcing AS Sets IT - stores all inaccurate updates NN - stores all unnecessary updates We use 60 day consistency check window (Nov 20, 2009-Jan 20, 2010) to: Determine if the prediction was accurate Based on behavior analysis Classification Count Total NN set entries 3546 NN set entries classified in G set 71 (2.5%) NN set entries classified in B set 2591 (97.4%) NN set entries classified in U set 3 (0.1%) Total IT set entries 625 IT set entries classified in G set 7 (0.2%) IT set entries classified in B set 0 (0%) IT set entries classified in U set 618 (98.8%) 11/4/09 ONR MURI Review 23

24 Alert Accuracy For updates deemed inaccurate: AS-CRED detects prefix hijacking in two places: Behavior analysis to populate U set Alert generation when RepU is used to determine if update is a hijack Behavior Analysis shown to be accurate Compared the alert results with Internet Alert Registry and IRR (comparative ground-truth) 8 fold improvement in False Positives False Positive Hijack For updates deemed unnecessary : 88% of the associated AS-prefix binding found in IRR Average NAW 26 with the maximum 4492 Contrast for AS-prefix binding in Good set (Avg. NAW ~ 1) Scheme No Record IRR Match No IRR Match AS-CRED 112 (18.1%) 42(8.3%) 465 (91.7%) IAR 413 (11.2%) 2437(75.4%) 798 (24.6%) Alert Generation (Jan 1-Jan 10) vs. IAR w.r.t. IRR 11/4/09 ONR MURI Review 24

25 AS-CRED Service Screenshot Bottom 5 ASes by Reputation Past Reputation Trend for an AS Reputation-based Update Alert 11/4/09 ONR MURI Review 25

26 Conclusions & Future Work Conclusions: Repetitive Behavior: ASes which announce invalid updates do so repeatedly, which makes reputation a good metric to characterize them Large number of Unnecessary Updates: The number of unnecessary updates with poor stability far outnumber the inaccurate ones and those with illegal values Sensitivity: The reputation metric is very sensitive and can capture ASes which seldom announce invalid updates Improved Hijack Detection: The AS-behavior analysis and alert service are much more accurate than existing services (such as the IAR) for detecting prex hijacking Consistency of Analysis and Reputation: The reputation assigned to an AS is a representative and behavior predictive value. Future Work: Extend this work by including other properties for determining an AS' tendency to announce valid updates, such as presence of valley-free path and stable links in the AS-PATH. 11/4/09 ONR MURI Review 26

27 Thank You & Questions 11/4/09 ONR MURI Review 27 27

AS-CRED: Reputation and Alert Service for Inter- Domain Routing

AS-CRED: Reputation and Alert Service for Inter- Domain Routing University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science 9-2013 AS-CRED: Reputation and Alert Service for Inter- Domain Routing Jian Chang OpenX,

More information

AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP

AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science 6-2011 AS-TRUST: A Trust Quantification Scheme for Autonomous Systems in BGP Jian Chang

More information

Understanding BGP Miscounfiguration

Understanding BGP Miscounfiguration Understanding Archana P Student of Department of Electrical & Computer Engineering Missouri University of Science and Technology appgqb@mst.edu 16 Feb 2017 Introduction Background Misconfiguration Outline

More information

Evaluation of BGP Anomaly Detection and Robustness Algorithms

Evaluation of BGP Anomaly Detection and Robustness Algorithms Trustworthy Networking Program Evaluation of BGP Anomaly Detection and Robustness Algorithms Kotikapaludi Sriram, Doug Montgomery, Oliver Borchert, Okhee Kim, and Patrick Gleichmann National Institute

More information

A Measurement Study of BGP Misconfiguration

A Measurement Study of BGP Misconfiguration A Measurement Study of BGP Misconfiguration Ratul Mahajan, David Wetherall, and Tom Anderson University of Washington Motivation Routing protocols are robust against failures Meaning fail-stop link and

More information

BGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage.

BGP Anomaly Detection. Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage. BGP Anomaly Detection Bahaa Al-Musawi PhD candidate Supervisors: Dr. Philip Branch and Prof. Grenville Armitage balmusawi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University

More information

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications

An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications An Empirical Study of Behavioral Characteristics of Spammers: Findings and Implications Zhenhai Duan, Kartik Gopalan, Xin Yuan Abstract In this paper we present a detailed study of the behavioral characteristics

More information

PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation. Andrew G. West November 4, 2009 ONR-MURI Presentation

PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation. Andrew G. West November 4, 2009 ONR-MURI Presentation PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation Andrew G. West November 4, 2009 ONR-MURI Presentation PreSTA: Preventative Spatio-Temporal Aggregation PROBLEM ---------- SOLUTION

More information

Region-based BGP Announcement Filtering for Improved BGP Security

Region-based BGP Announcement Filtering for Improved BGP Security Region-based BGP Announcement Filtering for Improved BGP Security Fernando Sanchez Florida State University sanchez@cs.fsu.edu Zhenhai Duan Florida State University duan@cs.fsu.edu ABSTRACT BGP prefix

More information

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

PHAS: A Prefix Hijack Alert System

PHAS: A Prefix Hijack Alert System PHAS: A Prefix Hijack Alert System Mohit Lad mohit@cs.ucla.edu Yiguo Wu yiguowu@cs.ucla.edu Dan Massey massey@cs.colostate.edu Beichuan Zhang bzhang@cs.arizona.edu Dan Pei peidan@research.att.com Lixia

More information

Inter-domain Routing(BGP) Security [IP Prefix Hijacking] Akmal Khan

Inter-domain Routing(BGP) Security [IP Prefix Hijacking] Akmal Khan Inter-domain Routing(BGP) Security [IP Hijacking] Akmal Khan [raoakhan@mmlab.snu.ac.kr] 4-15-2010 2 Outline Introduction Types of IP Hijacking Internet Routing Data Sources Tools of the Trade Past Research

More information

MANRS Mutually Agreed Norms for Routing Security

MANRS Mutually Agreed Norms for Routing Security 27 March 2018 MANRS Mutually Agreed Norms for Routing Security Kevin Meynell meynell@isoc.org Presentation title Client name Internet Society 1992 2016 1 The Problem A Routing Security Overview 2 The Basics:

More information

Routing and router security in an operator environment

Routing and router security in an operator environment DD2495 p4 2011 Routing and router security in an operator environment Olof Hagsand KTH CSC 1 Router lab objectives A network operator (eg ISP) needs to secure itself, its customers and its neighbors from

More information

Preventing the unnecessary propagation of BGP withdraws

Preventing the unnecessary propagation of BGP withdraws Preventing the unnecessary propagation of BGP withdraws V. Van den Schrieck, P. François, C. Pelsser, O.Bonaventure http://inl.info.ucl.ac.be Networking 2009, May 13th Agenda Introduction Presentation

More information

StrobeLight: Lightweight Availability Mapping and Anomaly Detection. James Mickens, John Douceur, Bill Bolosky Brian Noble

StrobeLight: Lightweight Availability Mapping and Anomaly Detection. James Mickens, John Douceur, Bill Bolosky Brian Noble StrobeLight: Lightweight Availability Mapping and Anomaly Detection James Mickens, John Douceur, Bill Bolosky Brian Noble At any given moment, how can we tell which enterprise machines are online and

More information

Major Project Part II. Isolating Suspicious BGP Updates To Detect Prefix Hijacks

Major Project Part II. Isolating Suspicious BGP Updates To Detect Prefix Hijacks Major Project Part II Isolating Suspicious BGP Updates To Detect Prefix Hijacks Author: Abhishek Aggarwal (IIT Delhi) Co-authors: Anukool Lakhina (Guavus Networks Inc.) Prof. Huzur Saran (IIT Delhi) !

More information

Routing Security We can do better!

Routing Security We can do better! Routing Security We can do better! And how MANRS can help Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 90 60 Hijack Leak 30 0 1/5/17 1/16/17 1/27/17

More information

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times

On the Impact of Route Processing and MRAI Timers on BGP Convergence Times On the Impact of Route Processing and MRAI Timers on BGP Convergence Times Shivani Deshpande and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic Institute, Troy, NY 12180 Abstract Fast convergence

More information

Security in inter-domain routing

Security in inter-domain routing DD2491 p2 2011 Security in inter-domain routing Olof Hagsand KTH CSC 1 Literature Practical BGP pages Chapter 9 See reading instructions Beware of BGP Attacks (Nordström, Dovrolis) Examples of attacks

More information

On the Impact of Filters on Analyzing Prefix Reachability in the Internet. Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009

On the Impact of Filters on Analyzing Prefix Reachability in the Internet. Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009 On the Impact of Filters on Analyzing Prefix Reachability in the Internet Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University ICCCN 2009 Background Border Gateway Protocol (BGP) Inter-domain policy

More information

Secure Routing with RPKI. APNIC44 Security Workshop

Secure Routing with RPKI. APNIC44 Security Workshop Secure Routing with RPKI APNIC44 Security Workshop Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

CNT Computer and Network Security: BGP Security

CNT Computer and Network Security: BGP Security CNT 5410 - Computer and Network Security: BGP Security Professor Kevin Butler Fall 2015 Internet inter-as routing: BGP BGP (Border Gateway Protocol): the de facto standard BGP provides each AS a means

More information

MANRS. Mutually Agreed Norms for Routing Security. Jan Žorž

MANRS. Mutually Agreed Norms for Routing Security. Jan Žorž MANRS Mutually Agreed Norms for Routing Security Jan Žorž The Problem A Routing Security Overview 2 No Day Without an Incident http://bgpstream.com/ 3 Routing Incidents Cause Real World

More information

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System

Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property of BGP Routing System School of Computer,

More information

BGP Security via Enhancements of Existing Practices

BGP Security via Enhancements of Existing Practices IEEE International Conference on Communications 2009 1 BGP Security via Enhancements of Existing Practices Xiaoliang Zhao, David T. Kao * Abstract Border Gateway Protocol (BGP) is the de-facto inter-domain

More information

Misdirection / Hijacking Incidents

Misdirection / Hijacking Incidents Security Tutorial @ TWNOG SECURE ROUTING WITH RPKI 1 Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours) Pakistan Telecom announced YT block Google (AS15169) services

More information

Deploying RPKI An Intro to the RPKI Infrastructure

Deploying RPKI An Intro to the RPKI Infrastructure Deploying RPKI An Intro to the RPKI Infrastructure VNIX-NOG 24 November 2016 Hanoi, Vietnam Issue Date: Revision: Misdirection / Hijacking Incidents YouTube Incident Occurred 24 Feb 2008 (for about 2 hours)

More information

Investigating occurrence of duplicate updates in BGP announcements

Investigating occurrence of duplicate updates in BGP announcements Investigating occurrence of duplicate updates in BGP announcements Jonathan Park, Dan Jen, Mohit Lab, Shane Amante, Danny McPherson, Lixia Zhang GROW @ IETF75 July 27, 2009 Why This Work All BGP update

More information

On Reverse Engineering the Management Actions from Observed BGP Data

On Reverse Engineering the Management Actions from Observed BGP Data On Reverse Engineering the Management Actions from Observed BGP Data Shih Ming Tseng, S. Felix Wu University of California, Davis Email: {smtseng,sfwu}@ucdavis.edu Xiaoliang Zhao Verizon Communications

More information

Measuring BGP. Geoff Huston. CAIA SEMINAR 31 May

Measuring BGP. Geoff Huston. CAIA SEMINAR 31 May Measuring BGP Geoff Huston BGP is An instance of the Bellman-Ford Distance Vector family of routing protocols And a relatively vanilla one at that The routing protocol used to support inter-domain routing

More information

A Longitudinal Study of BGP MOAS Prefixes

A Longitudinal Study of BGP MOAS Prefixes A Longitudinal Study of BGP MOAS Prefixes Quentin Jacquemart Eurecom Sophia Antipolis Guillaume Urvoy-Keller Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, 06900 Sophia Antipolis Ernst Biersack Eurecom

More information

Accurate Real-time Identification of IP Hijacking. Presented by Jacky Mak

Accurate Real-time Identification of IP Hijacking. Presented by Jacky Mak Accurate Real-time Identification of IP Hijacking Presented by Jacky Mak Outline Problem and Objectives Interdomain Routing and BGP Basics Attack Model of IP Hijacking Real-time Detection Techniques Implementation

More information

Dynamics of Hot-Potato Routing in IP Networks

Dynamics of Hot-Potato Routing in IP Networks Dynamics of Hot-Potato Routing in IP Networks Jennifer Rexford AT&T Labs Research http://www.research.att.com/~jrex Joint work with Renata Teixeira (UCSD), Aman Shaikh (AT&T), and Timothy Griffin (Intel)

More information

On the State of the Inter-domain and Intra-domain Routing Security

On the State of the Inter-domain and Intra-domain Routing Security On the State of the Inter-domain and Intra-domain Routing Security Mingwei Zhang April 19, 2016 Mingwei Zhang Internet Routing Security 1 / 54 Section Internet Routing Security Background Internet Routing

More information

CSCD 433/533 Network Programming Fall Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing

CSCD 433/533 Network Programming Fall Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing CSCD 433/533 Network Programming Fall 2012 Lecture 14 Global Address Space Autonomous Systems, BGP Protocol Routing 1 Topics Interdomain Routing BGP Interdomain Routing Benefits vs. Link State Routing

More information

Mutually Agreed Norms for Routing Security NAME

Mutually Agreed Norms for Routing Security NAME Mutually Agreed Norms for Routing Security NAME EMAIL The Problem A Routing Security Overview 2 Routing Incidents are Increasing In 2017 alone, 14,000 routing outages or attacks such as hijacking, leaks,

More information

Accurate Real-time Identification of IP Hijacking

Accurate Real-time Identification of IP Hijacking Accurate Real-time Identification of IP Hijacking 1 Xin Hu Z. Morley Mao University of Michigan huxin@umich.edu zmao@umich.edu Abstract In this paper, we present novel and practical techniques to accurately

More information

CS 268: Computer Networking

CS 268: Computer Networking CS 268: Computer Networking L-3 BGP Outline BGP ASes, Policies BGP Attributes BGP Path Selection ibgp 2 1 Autonomous Systems (ASes) Autonomous Routing Domain Glued together by a common administration,

More information

Security Issues of BGP in Complex Peering and Transit Networks

Security Issues of BGP in Complex Peering and Transit Networks Technical Report IDE-0904 Security Issues of BGP in Complex Peering and Transit Networks Presented By: Supervised By: Muhammad Adnan Khalid Qamar Nazir Olga Torstensson Master of Computer network engineering

More information

Securing BGP. Geoff Huston November 2007

Securing BGP. Geoff Huston November 2007 Securing BGP Geoff Huston November 2007 Agenda An Introduction to BGP BGP Security Questions Current Work Research Questions An Introduction to BGP Background to Internet Routing The routing architecture

More information

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015

Internet-Draft Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Network Working Group M. Lepinski, Ed. Internet-Draft BBN Intended status: Standards Track July 4, 2014 Expires: January 5, 2015 Abstract BGPSEC Protocol Specification draft-ietf-sidr-bgpsec-protocol-09

More information

Module: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security

Module: Routing Security. Professor Patrick McDaniel Spring CMPSC443 - Introduction to Computer and Network Security CMPSC443 - Introduction to Computer and Network Security Module: Routing Security Professor Patrick McDaniel Spring 2009 1 Routing 101 Network routing exists to provide hosts desirable paths from the source

More information

TTM AS-level Traceroutes

TTM AS-level Traceroutes TTM AS-level Traceroutes Matching IPs to ASes René Wilhelm New Projects Group RIPE NCC 1 Motivation TTM performs frequent traceroutes to find closest IP route for delay measurements

More information

BGP Route Stability. Alexander Asimov Highload Lab

BGP Route Stability. Alexander Asimov Highload Lab BGP Route Stability Alexander Asimov Highload Lab Research history 9-2010 study of BGP convergence process: Imitation testbed (BGPC + PRIME); BGP convergence time equations; Experiments

More information

The Impact of Router Outages on the AS-Level Internet

The Impact of Router Outages on the AS-Level Internet The Impact of Router Outages on the AS-Level Internet Matthew Luckie* - University of Waikato Robert Beverly - Naval Postgraduate School *work started while at CAIDA, UC San Diego SIGCOMM 2017, August

More information

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal

CS4450. Computer Networks: Architecture and Protocols. Lecture 15 BGP. Spring 2018 Rachit Agarwal CS4450 Computer Networks: Architecture and Protocols Lecture 15 BGP Spring 2018 Rachit Agarwal Autonomous System (AS) or Domain Region of a network under a single administrative entity Border Routers Interior

More information

Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks

Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks Understanding Resiliency of Internet Topology Against Prefix Hijack Attacks Mohit Lad Ricardo Oliveira Beichuan Zhang Lixia Zhang Abstract A prefix hijack attack involves an attacker announcing victim

More information

Measuring the Adoption of Route Origin Validation and Filtering

Measuring the Adoption of Route Origin Validation and Filtering Measuring the Adoption of Route Origin Validation and Filtering Andreas Reuter (andreas.reuter@fu-berlin.de) Joint work with Randy Bush, Ethan Katz-Bassett, Italo Cunha, Thomas C. Schmidt, and Matthias

More information

PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation. Andrew G. West November 4, 2009 ONR-MURI Presentation

PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation. Andrew G. West November 4, 2009 ONR-MURI Presentation PreSTA: Preventing Malicious Behavior Using Spatio-Temporal Reputation Andrew G. West November 4, 2009 ONR-MURI Presentation Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden

More information

Autonomous Security for Autonomous Systems

Autonomous Security for Autonomous Systems Autonomous Security for Autonomous Systems Josh Karlin, Stephanie Forrest, and Jennifer Rexford Abstract The Internet s interdomain routing protocol, BGP, supports a complex network of Autonomous Systems

More information

The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet

The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet The Spoofer Project Inferring the Extent of Source Address Filtering on the Internet Rob Beverly and Steve Bauer {rbeverly,bauer}@mit.edu The Spoofer Project Goal: Quantify the extent and nature of source

More information

BGPMON.IO: THE MANY NEW FACES OF BGPMON

BGPMON.IO: THE MANY NEW FACES OF BGPMON BGPMON.IO: THE MANY NEW FACES OF BGPMON Colorado State University Spiros Thanasoulas and Christos Papadopoulos NANOG 69, Feb 6-8 2017, Washington DC Work supported by NSF #CNS1305404, DHS #D15PC00205,

More information

the real-time Internet routing observatory

the real-time Internet routing observatory the real-time Internet routing observatory Alessandro Improta alessandro.improta@iit.cnr.it Luca Sani luca.sani@iit.cnr.it VSIX Meeting, May 10, 2017 - Padova Our research interest: the Internet AS-level

More information

Network Security: Routing security. Aapo Kalliola T Network security Aalto University, Nov-Dec 2012

Network Security: Routing security. Aapo Kalliola T Network security Aalto University, Nov-Dec 2012 Network Security: Routing security Aapo Kalliola T-110.5241 Network security Aalto University, Nov-Dec 2012 Outline 1. Structure of internet 2. Routing basics 3. Security issues 4. Attack 5. Solutions

More information

BGP Configuration Automation on Edge Routers

BGP Configuration Automation on Edge Routers BGP Configuration Automation on Edge Routers System and Network Engineering Msc. Research Project Stella Vouteva & Tarcan Turgut Supervisor: Stavros Konstantaras, NLNetLabs Introduction Big Internet Depletion

More information

Introduction to BGP. ISP Workshops. Last updated 30 October 2013

Introduction to BGP. ISP Workshops. Last updated 30 October 2013 Introduction to BGP ISP Workshops Last updated 30 October 2013 1 Border Gateway Protocol p A Routing Protocol used to exchange routing information between different networks n Exterior gateway protocol

More information

Introduc)on to Computer Networks

Introduc)on to Computer Networks Introduc)on to Computer Networks COSC 4377 Lecture 15 Spring 2012 March 19, 2012 Announcements HW7 due this week HW8 due 3/28 Exam 2 on 4/23 HW7 RIP (Rou)ng Informa)on Protocol) Components Forwarding Rou)ng

More information

Introducción al RPKI (Resource Public Key Infrastructure)

Introducción al RPKI (Resource Public Key Infrastructure) Introducción al RPKI (Resource Public Key Infrastructure) Roque Gagliano rogaglia@cisco.com 4 Septiembre 2013 Quito, Equator 2011 Cisco and/or its affiliates. All rights reserved. 1 Review of problem to

More information

the real-time Internet routing observatory Luca Sani

the real-time Internet routing observatory Luca Sani the real-time Internet routing observatory Luca Sani 1 / 24 Our research topic: discovering the Internet structure Everyone knows the role of the Internet in our society, but since its commercialization

More information

Detecting inconsistencies in INRDB data

Detecting inconsistencies in INRDB data Detecting inconsistencies in INRDB data to identify MOAS cases and possible illegitimate Internet resource usage Peter Ruissen System and Network Engineering University of Amsterdam December 11, 2007 1

More information

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, John Janno? Administrivia Midterm moved up from 3/17 to 3/15 IP

More information

On the Characteristics of BGP Multiple Origin AS Conflicts

On the Characteristics of BGP Multiple Origin AS Conflicts 1 On the Characteristics of BGP Multiple Origin AS Conflicts Kwan-Wu Chin School of Electrical, Computer and Telecommunications Engineering University of Wollongong Northfields Avenue, NSW, Australia kwanwu@uow.edu.au

More information

BGP Route Flap Damping Algorithms

BGP Route Flap Damping Algorithms BGP Route Flap Damping Algorithms Wei Shen and Ljiljana Trajković * Simon Fraser University Vancouver, British Columbia, Canada {wshen, ljilja}@cs.sfu.ca Keywords: Routing protocols, BGP, route flap damping,

More information

CSE 461 Interdomain routing. David Wetherall

CSE 461 Interdomain routing. David Wetherall CSE 461 Interdomain routing David Wetherall djw@cs.washington.edu Interdomain routing Focus: Routing across internetworks made up of different parties Route scaling Application Route policy Transport The

More information

BGP Security. Kevin s Attic for Security Research

BGP Security. Kevin s Attic for Security Research Kevin s Attic for Security Research kevinkoo001@gmail.com Table 1. BGP Operation (1): Concept & Topology 2. BGP Operation (2): Message Exchange, Format and Path Decision Algorithm 3. Potential Attacks

More information

ISP 1 AS 1 Prefix P peer ISP 2 AS 2 Route leak (P) propagates Prefix P update Route update P Route leak (P) to upstream 2 AS 3 Customer BGP Update messages Route update A ISP A Prefix A ISP B B leaks

More information

CE Advanced Network Security Routing Security II

CE Advanced Network Security Routing Security II CE 817 - Advanced Network Security Routing Security II Lecture 21 Mehdi Kharrazi Department of Computer Engineering Sharif University of Technology Acknowledgments: Some of the slides are fully or partially

More information

BGP Path Exploration Damping (PED)

BGP Path Exploration Damping (PED) BGP Path Exploration Damping (PED) Mattia Rossi mrossi@swin.edu.au Centre for Advanced Internet Architectures (CAIA) Swinburne University of Technology Outline Introduction Motivation Path Exploration

More information

BGP Route Leaks Analysis

BGP Route Leaks Analysis BGP Route Leaks Analysis Benjamin Wijchers Faculty of Exact Sciences, department of Computer Science Vrije Universiteit Amsterdam December 3, 2014 Supervisors: Dr. Benno Overeinder (NLnetLabs) Dr. Paola

More information

Routing Is At Risk. Let's Secure It Together. Andrei Robachevsky 1

Routing Is At Risk. Let's Secure It Together. Andrei Robachevsky 1 Routing Is At Risk. Let's Secure It Together Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 100 80 60 Hijack Leak 40 20 0 1/1/17 2/1/17 3/1/17 4/1/17

More information

Interdomain Routing and Connectivity

Interdomain Routing and Connectivity Interdomain Routing and Connectivity Brighten Godfrey CS 538 February 28 2018 slides 2010-2018 by Brighten Godfrey unless otherwise noted Routing Choosing paths along which messages will travel from source

More information

The Transition to BGP Security Is the Juice Worth the Squeeze?

The Transition to BGP Security Is the Juice Worth the Squeeze? The Transition to BGP Security Is the Juice Worth the Squeeze? RPKI Sharon Goldberg Boston University November 2013 Work with Kyle Brogle (Stanford), Danny Cooper (BU), Ethan Heilman (BU), Robert Lychev

More information

The Implementation of BGP Monitoring, Alarming, and Protecting System by a BGP-UPDATE-Based Method using ECOMMUNITY in Real Time

The Implementation of BGP Monitoring, Alarming, and Protecting System by a BGP-UPDATE-Based Method using ECOMMUNITY in Real Time The Implementation of BGP Monitoring, Alarming, and Protecting System by a BGP-UPDATE-Based Method using ECOMMUNITY in Real Time Je-kuk Yun 1, Beomseok Hong 2, and Yanggon Kim 3 1 Information Technology,

More information

A Configuration based Approach to Mitigating Man-inthe-Middle Attacks in Enterprise Cloud IaaS Networks running BGP

A Configuration based Approach to Mitigating Man-inthe-Middle Attacks in Enterprise Cloud IaaS Networks running BGP A Configuration based Approach to Mitigating Man-inthe-Middle Attacks in Enterprise Cloud IaaS Networks running BGP Stephen Brako Oti Isaac Bansah Tonny M. Adegboyega ABSTRACT Cloud IaaS service providers

More information

Introduction to BGP. ISP/IXP Workshops

Introduction to BGP. ISP/IXP Workshops Introduction to BGP ISP/IXP Workshops 1 Border Gateway Protocol A Routing Protocol used to exchange routing information between different networks Exterior gateway protocol Described in RFC4271 RFC4276

More information

NaMeX Route Server HOWTO

NaMeX Route Server HOWTO NaMeX Route Server HOWTO June 24, 2010 1 Service overview Route servers (RS) are a value-added service that can be offered by IXPs. Actually, the availability of a RS within an IXP is becoming more and

More information

Securing BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC

Securing BGP: The current state of RPKI. Geoff Huston Chief Scientist, APNIC Securing BGP: The current state of RPKI Geoff Huston Chief Scientist, APNIC Incidents What happens when I announce your addresses in BGP? All the traffic that used to go to you will now come to me I can

More information

Demystifying the IP Blackspace

Demystifying the IP Blackspace Demystifying the IP Blackspace Quentin Jacquemart 1, Pierre-Antoine Vervier 2, Guillaume Urvoy-Keller 3, and Ernst Biersack 4 1 Eurecom, Sophia Antipolis quentin.jacquemart@eurecom.fr 2 Symantec Research

More information

BGP Configuration for a Transit ISP

BGP Configuration for a Transit ISP BGP Configuration for a Transit ISP ISP Workshops Last updated 24 April 2013 1 Definitions p Transit carrying traffic across a network, usually for a fee n traffic and prefixes originating from one AS

More information

Taming BGP. An incremental approach to improving the dynamic properties of BGP. Geoff Huston. CAIA Seminar 18 August

Taming BGP. An incremental approach to improving the dynamic properties of BGP. Geoff Huston. CAIA Seminar 18 August Taming BGP An incremental approach to improving the dynamic properties of BGP Geoff Huston BGP is The inter-domain routing protocol for the Internet An instance of a Distance Vector Protocol with explicit

More information

Inter-Domain Routing Trends

Inter-Domain Routing Trends Inter-Domain Routing Trends Geoff Huston gih@apnic.net APNIC March 2007 Agenda 1. Some data about the network and BGP over 2006 2. Some observations about the distribution patterns of BGP updates 3. Pointers

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution

More information

BGP Route Security Cycling to the Future! Alexander Azimov Qrator Labs

BGP Route Security Cycling to the Future! Alexander Azimov Qrator Labs BGP Route Security Cycling to the Future! Alexander Azimov Qrator Labs aa@qrator.net Malicious Hijacks/Leaks FISHING SITES HIJACK OF HTTPS CERTIFICATES SPAM/BOTNET ACTIVITY DOS ATTACKS BGP Hijack Factory

More information

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca

CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca CSCI-1680 Network Layer: Inter-domain Routing Rodrigo Fonseca Based partly on lecture notes by Rob Sherwood, David Mazières, Phil Levis, John Janno? Today Last time: Intra-Domain Routing (IGP) RIP distance

More information

Routing Is At Risk. Let's Secure It Together. Andrei Robachevsky 1

Routing Is At Risk. Let's Secure It Together. Andrei Robachevsky 1 Routing Is At Risk. Let's Secure It Together Andrei Robachevsky robachevsky@isoc.org 1 No Day Without an Incident 120 6 month of suspicious activity 100 80 60 Hijack Leak 40 20 0 1/1/17 2/1/17 3/1/17 4/1/17

More information

BGP Techniques for ISP. Terutaka Komorizono

BGP Techniques for ISP. Terutaka Komorizono BGP Techniques for ISP Terutaka Komorizono Introduction Presentation has many configuration examples Using Cisco IOS CLI Aimed at Service Providers Techniques can be used by many enterprises

More information

Auto-Detecting Hijacked Prefixes?

Auto-Detecting Hijacked Prefixes? Auto-Detecting Hijacked Prefixes? Geoff Huston APNIC @RIPE 50 May 2005 1 Address Hijacking Is the unauthorized use of an address prefix as an advertised route object on the Internet It s not a bogon the

More information

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS. A Thesis KRISHNA CHAITANYA TADI

A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS. A Thesis KRISHNA CHAITANYA TADI A FRAMEWORK FOR DEFENDING AGAINST PREFIX HIJACK ATTACKS A Thesis by KRISHNA CHAITANYA TADI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements

More information

Toward Understanding the Behavior of BGP During Large-Scale Power Outages

Toward Understanding the Behavior of BGP During Large-Scale Power Outages Toward Understanding the Behavior of BGP During Large-Scale Power Outages Jun Li, Zhen Wu, and Eric Purpus {lijun, zwu, epurpus}@cs.uoregon.edu Computer and Information Science Department University of

More information

Detection of Invalid Routing Announcement in the Internet Λ

Detection of Invalid Routing Announcement in the Internet Λ Detection of Invalid Routing Announcement in the Internet Λ Xiaoliang Zhao, Dan Pei, Lan Wang, Dan Massey, Allison Mankin, S. Felix Wu,Lixia Zhang y Abstract Network measurement has shown that a specific

More information

BGP Origin Validation

BGP Origin Validation BGP Origin Validation ISP Workshops These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Last updated

More information

internet technologies and standards

internet technologies and standards Institute of Telecommunications Warsaw University of Technology internet technologies and standards Piotr Gajowniczek BGP (Border Gateway Protocol) structure of the Internet Tier 1 ISP Tier 1 ISP Google

More information

A Survey of BGP Security: Issues and Solutions

A Survey of BGP Security: Issues and Solutions A Survey of BGP Security: Issues and Solutions Butler, Farley, McDaniel, Rexford Kyle Super CIS 800/003 October 3, 2011 Outline Introduction/Motivation Sources of BGP Insecurity BGP Security Today BGP

More information

Timer Interaction in Route Flap Damping

Timer Interaction in Route Flap Damping Timer Interaction in Route Flap Damping Beichuan Zhang, Dan Pei, Lixia Zhang #UCLA$ Daniel Massey #Colorado State$ June, 2005 1 This Talk Route Flap Damping is a key mechanism in BGP to maintain global

More information

Securing the Internet at the Exchange Point Fernando M. V. Ramos

Securing the Internet at the Exchange Point Fernando M. V. Ramos Securing the Internet at the Exchange Point Fernando M. V. Ramos 18.09.2017 Securing the Internet at the Exchange Point Fernando M. V. Ramos 18.09.2017 There are vulnerabilities in the Internet architecture

More information

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783.

Introduction. Keith Barker, CCIE #6783. YouTube - Keith6783. Understanding, Implementing and troubleshooting BGP 01 Introduction http:// Instructor Introduction Keith Barker, CCIE #6783 CCIE Routing and Switching 2001 CCIE Security 2003 kbarker@ine.com YouTube -

More information

Routing Basics ISP/IXP Workshops

Routing Basics ISP/IXP Workshops Routing Basics ISP/IXP Workshops 1 Routing Concepts IPv4 Routing Forwarding Some definitions Policy options Routing Protocols 2 IPv4 Internet uses IPv4 addresses are 32 bits long range from 1.0.0.0 to

More information

Configuring BGP community 43 Configuring a BGP route reflector 44 Configuring a BGP confederation 44 Configuring BGP GR 45 Enabling Guard route

Configuring BGP community 43 Configuring a BGP route reflector 44 Configuring a BGP confederation 44 Configuring BGP GR 45 Enabling Guard route Contents Configuring BGP 1 Overview 1 BGP speaker and BGP peer 1 BGP message types 1 BGP path attributes 2 BGP route selection 6 BGP route advertisement rules 6 BGP load balancing 6 Settlements for problems

More information

BGP Origin Validation (RPKI)

BGP Origin Validation (RPKI) University of Amsterdam System & Network Engineering BGP Origin Validation (RPKI) July 5, 2013 Authors: Remy de Boer Javy de Koning Supervisors: Jac Kloots

More information